The Avenger. Usage and Release Notes

Size: px
Start display at page:

Download "The Avenger. Usage and Release Notes"

Transcription

1 The Avenger Usage and Release Notes The Avenger is a full-scriptable, kernel-level driver designed to remove highly persistent files and registry keys/values protected by entrenched malware. Basically this means that The Avenger is a program to which you give commands to execute (the script) consisting of files to delete, etc., which would otherwise be hard to delete because they were protected or in use by malicious software. With the recent proliferation of rootkits and other strongly-protected forms of malware, a tool like this one to remove deeply-entrenched files has become more and more necessary. The Avenger is currently at version 1. Every attempt has been made to ensure its safety, but it is provided with absolutely no warranty whatsoever and its safety cannot be 100% guaranteed! You use The Avenger at your own risk please use it only under qualified supervision. For assistance please contact me at Swandog46 [at] mvps [dot] org, or one of the helpers at one of the ASAP forums, such as SWI. Be forewarned! The Avenger is a VERY powerful program, designed to remove highly persistent files and registry keys. As a result, it can easily be misused. Certain misuses of this program could prevent your system from ever starting up again. Please be careful! (1 of 12)12/19/2007 2:47:01 AM

2 Usage and release notes for The Avenger are listed below, in four sections: (1) System requirements and program usage (2) Script syntax (3) Command line arguments and usage (4) License, credits, and acknowledgements (1) System Requirements and Program Usage System Requirements: 1) The Avenger will work ONLY on Windows 2000 and XP, and only on 32-bit versions! Please do NOT attempt to use it on any other operating system. It has not been tested on 64-bit platforms. 2) The Avenger must be run from a user account with administrator privileges. Program Usage: The Avenger may be downloaded from here, or from my main tools page. When run, the main Avenger window allows you to choose from one of three options for inputting a script to execute: (1) load a script from a file, (2) load a script from an internet URL, or (3) input a script manually. Clicking the Open File button or going to the File menu and choosing Open script file will allow you to (2 of 12)12/19/2007 2:47:01 AM

3 load a script from a file. Typing a URL into the Load script from Internet URL field will allow you to load a script from a URL (please note that you must include the prefix when loading scripts from URLs!). Selecting Input script manually and then clicking the magnifying glass icon: will allow you to type script commands directly for execution. If Load script from file or Load script from URL is selected, clicking the magnifying glass icon will allow you to view the current script in memory and edit it if desired. Clicking the green light icon: will begin execution of the script currently in memory. Clicking the stop icon: will quit the program. The log from the most recent use of The Avenger may be viewed by going to the File menu, and choosing Open log file. Finally, help and version information is available from the Help menu. After you have clicked on the green light to begin execution of a script, The Avenger will set itself up to run the next time you reboot your computer, and then will prompt you to restart immediately. After your system restarts, a log file should open with the results of Avenger s actions. This log file is located at % systemdrive%\avenger.txt, where %systemdrive% is a variable representing the main system drive of your computer (usually C:\ for most systems). The Avenger will also have backed up all the files, etc., that you asked it to delete, and will have zipped them and moved the zip archive to %systemdrive%\avenger\backup. zip. Registry backups will be inside this archive under the name backup.reg. (3 of 12)12/19/2007 2:47:01 AM

4 (2) Script Syntax The core of The Avenger is its script-processing functionality. As a result, I must discuss the syntax used in Avenger scripts. An Avenger script is composed of lines of plain text, containing one command directive per line. There are 11 commands in total that The Avenger recognizes. They are: 1) Comment: 2) Files to delete: 3) Files to replace with dummy: 4) Files to move: 5) Folders to delete: 6) Registry keys to delete: 7) Registry keys to replace with dummy: 8) Registry values to delete: 9) Registry values to replace with dummy: 10) Programs to launch on reboot: 11) Drivers to unload: Blank lines and whitespace in general including leading and trailing whitespace on command lines is ignored by The Avenger. (If you do not want whitespace to be stripped, you may enclose parts or all of any commands in quotation marks, which will override whitespace stripping.) All commands are caseinsensitive. The commands, respectively, do the following: 1) Comment: does nothing. Comment lines are so that (4 of 12)12/19/2007 2:47:01 AM

5 script-writers can put comments into their scripts. 2) Files to delete: deletes and backs up files listed (NOTE: this works only on files, not folders) 3) Files to replace with dummy: replaces files listed with empty dummy files, and backs up originals. 4) Files to move: moves files from a source location to a destination, backing up any existing destination files. This command will only work within drives/volumes (for example, do not try to move a file from D:\ to C:\ ; it will not work.) 5) Folders to delete: deletes and backs up folders listed (NOTE: this works only on folders, not files.) 6) Registry keys to delete: deletes and backs up registry keys listed. HKEY_LOCAL_MACHINE and HKEY_USERS are the only recognized registry hives, and either these long names or the abbreviations HKLM and HKU are acceptable. 7) Registry keys to replace with dummy: replaces all values under the selected registry key (recursively) with dummy values that means null strings for string values, and 0 for numeric values. 8) Registry values to delete: deletes and backs up specific registry values under registry keys as above. 9) Registry values to replace with dummy: replaces a single value under a registry key with a dummy as above. 10) Programs to launch on reboot: queues a program to run once at next reboot, to be able to extend Avenger to simple user-mode code and incorporate cleanup steps or larger malware fixes. 11) Drivers to unload: this is an experimental command, and should please be used sparingly. It will unload other system drivers, including kernel- and boot-level drivers. This process (5 of 12)12/19/2007 2:47:01 AM

6 requires TWO reboots, which will be automatically queued if any drivers to unload are listed. Please note that driver FILES are NOT automatically removed by this command. If you want files deleted in addition, you will have to add that yourself as a separate files to delete: command. One other important note: environmental variables such as % systemdrive%, %windir%, %temp%, or any other variable recognized by the command interpreter (including user-defined variables such as in a batch script) may be used in any Files commands (Files to delete:, Files to Replace with Dummy:, Files to move:, or also in Folders to delete: and Programs to launch on reboot: ). Because I know all of this is quite abstract, here is a concrete example of a functional script file: comment: I didn't really need to put in the comment: line since all leading lines not matching a command directive are interpreted as comments. But it is just to illustrate how comments work. After reading the Comment: directive above, The Avenger will ignore all subsequent lines until it finds another command directive. Please remember to put the colons : in when you put in command directives! Now I will add real commands so you can see sample syntax for each one. Files to delete: c:\windows\system32\badfile.dll %windir%\system32\badfile2.dll %systemdrive%\somefile.ext (6 of 12)12/19/2007 2:47:01 AM

7 Comment: Note the syntax of one file per line listed after the files to delete: command. Also note the use of environmental variables in the file names themselves. Files to replace with dummy: D:\somefile.ext FILES TO MOVE: C:\SOMESOURCEFILE c:\somedestinationfile C:\SOMESOURCEFILE c:\somedestinationfile Comment: Note the case insensitivity of the commands. Also note the syntax of the files to move: command, using the pipe to separate the source and destination paths. Whitespace is stripped before and after the pipe, up to any quotes that are found. Folders to Delete: C:\somefolder registry keys to delete: hklm\software\badkey hkey_local_machine\system\currentcontrolset\somebadkey registry keys to replace with dummy: hku\.default\somebadkey hklm\software\some long key name Comment: note that HKLM and HKU as well as HKEY_LOCAL_MACHINE and HKEY_USERS are accepted (case-insensitive as always). Also note that some long key name is a perfectly valid key name, and will be recognized since only leading and trailing whitespace is stripped (although if you are ever uncertain you can always add (7 of 12)12/19/2007 2:47:01 AM

8 quotes ). registry values to delete: HKEY_USERS\.default\badkey somebadvalue COMMENT: Note the use of the pipe syntax again to separate registry key names from registry value names in the registry values to delete: command. Registry values to replace with dummy: HKLM\SomeKeyPath\Blah\Blah somevalue programs to launch on reboot: %systemdrive%\mybatch.bat drivers to unload: BadServiceName COMMENT: The syntax for drivers to unload: is just to list the Service name of any driver you want unloaded. This would be the Service Name, as opposed to the Display Name usually visible in services. msc. The Service name is also the name of the subkey under HKLM \System\CurrentControlSet\Services. This is a valid script file. As another example without the cluttering comments, here is a similar script file, but greatly simplified. Files to delete: C:\test.txt Registry keys to delete: HKLM\Software\Test (8 of 12)12/19/2007 2:47:01 AM

9 Give it a try! This sample script file is uploaded at swandog46.geekstogo.com/samplescript.txt. Create a fake file called c:\test.txt, and a fake registry key called HKEY_LOCAL_MACHINE\Software\Test, and then download and run The Avenger. Select Load script from Internet URL, and in the address bar paste the URL Then click the green light icon, and reboot, and watch what happens! C:\test.txt will be deleted and backed up to C: \Avenger, as will HKLM\Software\Test. The entire process will be logged to C:\avenger.txt (assuming your %systemdrive% is C:\ ). (3) Command Line Arguments and Usage The Avenger may be run with full functionality from the command line, and the GUI may be completely suppressed in order for Avenger to be combined into larger scripts and malware fixes. If the /nogui flag is specified on the command line the GUI will be suppressed, and then other command line arguments will be checked. (All other command line arguments are ignored if / nogui is not specified.) The command line flags are: /nogui suppresses GUI. /q Quiet Mode. Suppresses warnings and informational messages, but not errors (9 of 12)12/19/2007 2:47:01 AM

10 /qq Silent Mode. Suppresses all messages except for fatal errors that require termination. Please use this flag sparingly since it suppresses some nonfatal errors that you should otherwise know about! /r Reboot Automatically. Ignored if not Silent Mode. Reboots automatically after setup, without prompting user first. /s ScriptLocation redirect script. Avenger will look for the script to load at ScriptLocation. This may either be a file path or a web URL (if a web URL it must contain a prefix " to let the program know). You may also enclose paths in quotes if there is any concern about spacing. If this flag is not set, Avenger looks for a script file at script.txt in the current working directory. If set, /s should be the last flag on the command line. So the full command line usage is: avenger.exe /nogui [/q] [/qq [/r]] [/s ScriptLocation] When The Avenger is run from the command line, it will return a 1 to the environment if it fails, and a 0 if it succeeds (Unix style). I think (although I haven't tested it) that you could test for its success by using IF NOT ERRORLEVEL 1 in a batch. (4) License, Credits, and Acknowledgements Permission is granted to use The Avenger freely for noncommercial purposes, but insofar as I have the legal right to do so, I insist please that The Avenger not be incorporated into other software, hosted, mirrored, or otherwise (10 of 12)12/19/2007 2:47:01 AM

11 redistributed in any way without my express permission. Please see my main tools page for more information. In addition, by using The Avenger you agree that you do so at your own risk, with full knowledge that I provide absolutely no warranty whatsoever or guarantee of the program s safety. Thank you very much to everyone who provided me feedback and helped in beta testing. I know that I will not be able to list every single person here, and if I missed you I apologize, and thank you too! But I wish to express the greatest gratitude to miekiemoes, IMM, Assarbad, LonnyRJones, Mosaic1, Grinler, Nigel, jedi, and many others. I would also like to acknowledge that I utilize the Info-ZIP compression software in this program, and as per their licensing requirements, below are the full contents of the Info-ZIP license: This is version 2005-Feb-10 of the Info-ZIP copyright and license. The definitive version of this document should be available at ftp://ftp.info-zip.org/pub/infozip/license.html indefinitely. Copyright (c) Info-ZIP. All rights reserved. For the purposes of this copyright and license, "Info-ZIP" is defined as the following set of individuals: Mark Adler, John Bush, Karl Davis, Harald Denker, Jean-Michel Dubois, Jean-loup Gailly, Hunter Goatley, Ed Gordon, Ian Gorman, Chris Herborth, Dirk Haase, Greg Hartwig, Robert Heath, Jonathan Hudson, Paul Kienitz, David Kirschbaum, Johnny Lee, Onno van der Linden, Igor Mandrichenko, Steve P. Miller, Sergio Monesi, Keith Owens, George Petrov, Greg Roelofs, Kai Uwe Rommel, Steve Salisbury, Dave Smith, Steven M. Schweda, Christian Spieler, Cosmin Truta, Antoine Verheijen, Paul von Behren, Rich Wales, Mike White (11 of 12)12/19/2007 2:47:01 AM

12 This software is provided "as is," without warranty of any kind, express or implied. In no event shall Info-ZIP or its contributors be held liable for any direct, indirect, incidental, special or consequential damages arising out of the use of or inability to use this software. Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions: 1. Redistributions of source code must retain the above copyright notice, definition, disclaimer, and this list of conditions. 2. Redistributions in binary form (compiled executables) must reproduce the above copyright notice, definition, disclaimer, and this list of conditions in documentation and/or other materials provided with the distribution. The sole exception to this condition is redistribution of a standard UnZipSFX binary (including SFXWiz) as part of a self-extracting archive; that is permitted without inclusion of this license, as long as the normal SFX banner has not been removed from the binary or disabled. 3. Altered versions--including, but not limited to, ports to new operating systems, existing ports with new graphical interfaces, and dynamic, shared, or static library versions--must be plainly marked as such and must not be misrepresented as being the original source. Such altered versions also must not be misrepresented as being Info-ZIP releases--including, but not limited to, labeling of the altered versions with the names "Info-ZIP" (or any variation thereof, including, but not limited to, different capitalizations), "Pocket UnZip," "WiZ" or "MacZip" without the explicit permission of Info-ZIP. Such altered versions are further prohibited from misrepresentative use of the Zip-Bugs or Info-ZIP addresses or of the Info-ZIP URL(s). 4. Info-ZIP retains the right to use the names "Info-ZIP," "Zip," "UnZip," "UnZipSFX," "WiZ," "Pocket UnZip," "Pocket Zip," and "MacZip" for its own source and binary releases. Please note that my adherence to the Info-ZIP licensing requirements IN NO WAY implies that anyone may redistribute The Avenger in similar fashion. Any and all redistributions of The Avenger are STRICTLY PROHIBITED as discussed above. Please report any bugs or comments, good or bad, to me at Swandog46 [at] mvps [dot] org. Enjoy The Avenger! Back to Tools Home (12 of 12)12/19/2007 2:47:01 AM

RollPod Configurator. User guide

RollPod Configurator. User guide User guide 2002-2005 Snell & Wilcox Ltd. www.snellwilcox.com Snell & Wilcox Ltd., Southleigh Park House, Eastleigh Road, Havant, Hants, PO9 2PE, United Kingdom. For technical assistance contact: Tel: +44

More information

Utility. User's Manual. Overview. Using the Utility. M Rev.C

Utility. User's Manual. Overview. Using the Utility. M Rev.C Utility User's Manual Overview Descriptions of the BA-T500II Utility features, operating environment, and installation/uninstallation Using the Utility Descriptions of how to use the BA-T500II Utility

More information

EPSON. Network Guide

EPSON. Network Guide EPSON Network Guide Copyright and Trademarks All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, mechanical, photocopying,

More information

Epson Stylus Pro WT7900. Network Guide

Epson Stylus Pro WT7900. Network Guide Epson Stylus Pro WT7900 Network Guide Copyright and Trademarks No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, mechanical, photocopying,

More information

Sophos Endpoint Security and Control standalone startup guide

Sophos Endpoint Security and Control standalone startup guide Sophos Endpoint Security and Control standalone startup guide Product version: 10.2 Document date: September 2012 Contents 1 Before you begin...3 2 Install Sophos Endpoint Security and Control...4 3 Configure

More information

Oracle Utilities Quotations Management

Oracle Utilities Quotations Management Oracle Utilities Quotations Management User s Guide Release 1.6.1.21 for Windows E18214-22 November 2015 Oracle Utilities Quotations Management/Quotations Management User s Guide, Release 1.6.1.21 for

More information

Toon Boom Harmony 11.1 Control Center and Server Guide

Toon Boom Harmony 11.1 Control Center and Server Guide Toon Boom Harmony 11.1 Control Center and Server Guide 1 1 Toon Boom Harmony 11.1 Control Center and Server Guide Legal Notices Toon Boom Animation Inc. 4200 Saint-Laurent, Suite 1020 Montreal, Quebec,

More information

EpsonNet b/g Wireless and 10/100 Base Tx Ext. Print Server

EpsonNet b/g Wireless and 10/100 Base Tx Ext. Print Server EpsonNet 802.11b/g Wireless and 10/100 Base Tx Ext. Print Server No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, mechanical, photocopying,

More information

Oracle Utilities Load Analysis

Oracle Utilities Load Analysis Oracle Utilities Load Analysis User s Guide Release 1.10.0.0 for Windows E18234-01 August 2010 Oracle Utilities Load Analysis User s Guide, Release 1.10.0.0 for Windows E18234-01 Copyright 1999, 2010 Oracle

More information

Network Guide NPD EN

Network Guide NPD EN NPD5040-00 EN Contents Contents Introduction Notices... 3 About this manual... 3 Caution, Important and Note... 3 Operating System Versions... 3 Network Basics... 4 Wi-Fi (wireless) network... 4 Ethernet

More information

TL Aggro may contain libpng, zlib, and FreeType. The license for libpng, zlib, and FreeType, respectively, follow.

TL Aggro may contain libpng, zlib, and FreeType. The license for libpng, zlib, and FreeType, respectively, follow. TL Aggro may contain libpng, zlib, and FreeType. The license for libpng, zlib, and FreeType, respectively, follow. ********License agreement for libpng library******** This copy of the libpng notices is

More information

DeploymentManager Ver6.0

DeploymentManager Ver6.0 DeploymentManager Ver6.0 First Step Guide -First Edition - Rev.001 Copyright NEC 2003-2011. All rights reserved. Disclaimers All information disclosed in this document is protected by the copyrights of

More information

User s Guide NPD EN

User s Guide NPD EN NPD4075-00 EN Copyrights and Trademarks Copyrights and Trademarks No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical,

More information

User Manual. TextWrangler. THE Text Editor for Anyone who Types. Bare Bones Software, Inc.

User Manual. TextWrangler. THE Text Editor for Anyone who Types. Bare Bones Software, Inc. User Manual TextWrangler THE Text Editor for Anyone who Types Bare Bones Software, Inc. TextWrangler 4.5.3 Product Design Product Engineering Documentation Additional Engineering Icon Design PHP keyword

More information

User s Guide NPD EN

User s Guide NPD EN NPD3903-00 EN Copyrights and Trademarks Copyrights and Trademarks No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical,

More information

User Manual. TextWrangler. THE Text Editor for Anyone who Types. Bare Bones Software, Inc.

User Manual. TextWrangler. THE Text Editor for Anyone who Types. Bare Bones Software, Inc. User Manual TextWrangler THE Text Editor for Anyone who Types Bare Bones Software, Inc. TextWrangler 5.5 Product Design Product Engineering Documentation Additional Engineering Icon Design Factory Text

More information

Migration Tool. Migration Tool (Beta) Technical Note

Migration Tool. Migration Tool (Beta) Technical Note Migration Tool (Beta) Technical Note VERSION: 6.0 UPDATED: MARCH 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies logo

More information

Hyper-V - Windows 2012 and 8. Virtual LoadMaster for Microsoft Hyper-V on Windows Server 2012, 2012 R2 and Windows 8. Installation Guide

Hyper-V - Windows 2012 and 8. Virtual LoadMaster for Microsoft Hyper-V on Windows Server 2012, 2012 R2 and Windows 8. Installation Guide Virtual LoadMaster for Microsoft Hyper-V on Windows Server 2012, 2012 R2 and Windows 8 Installation Guide VERSION: 5.0 UPDATED: JANUARY 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc..

More information

Packet Trace Guide. Packet Trace Guide. Technical Note

Packet Trace Guide. Packet Trace Guide. Technical Note Packet Trace Guide Technical Note VERSION: 2.0 UPDATED: JANUARY 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies logo

More information

Moodle. Moodle. Deployment Guide

Moodle. Moodle. Deployment Guide Moodle Deployment Guide VERSION: 6.0 UPDATED: MARCH 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies logo are registered

More information

Epic. Epic Systems. Deployment Guide

Epic. Epic Systems. Deployment Guide Epic Systems Deployment Guide VERSION: 1.0 UPDATED: AUGUST 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies logo are

More information

DENICOMP SYSTEMS Copyright? 2003 Denicomp Systems All rights reserved.

DENICOMP SYSTEMS Copyright? 2003 Denicomp Systems All rights reserved. Copyright? 2003 Denicomp Systems All rights reserved. Table of Contents INTRODUCTION TO WINSOCK RSHD/NT...1 REQUIREMENTS...1 SECURITY A WARNING...1 WINSOCK RSHD/NT INSTALLATION...2 INSTALLING FROM A CD

More information

Splunk. Splunk. Deployment Guide

Splunk. Splunk. Deployment Guide Deployment Guide VERSION: 1.0 UPDATED: JULY 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies logo are registered trademarks

More information

Veritas NetBackup Backup, Archive, and Restore Getting Started Guide. Release 8.1.2

Veritas NetBackup Backup, Archive, and Restore Getting Started Guide. Release 8.1.2 Veritas NetBackup Backup, Archive, and Restore Getting Started Guide Release 8.1.2 Veritas NetBackup Backup, Archive, and Restore Getting Started Guide Last updated: 2018-09-19 Legal Notice Copyright 2017

More information

User Manual. Date Aug 30, Enertrax DAS Download Client

User Manual. Date Aug 30, Enertrax DAS Download Client EnertraxDL - DAS Download Client User Manual Date Aug 30, 2004 Page 1 Copyright Information Copyright 2004, Obvius Holdings, LLC. All rights reserved. Redistribution and use in source and binary forms,

More information

Adobe Connect. Adobe Connect. Deployment Guide

Adobe Connect. Adobe Connect. Deployment Guide Deployment Guide VERSION: 1.0 UPDATED: MARCH 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies logo are registered trademarks

More information

Sophos Endpoint Security and

Sophos Endpoint Security and Sophos Endpoint Security and Control Sophos Endpoint Security and Control 10.3 Sophos Anti-Virus HIPS (Host Intrusion Prevention System) Rootkit Sophos Behavior Monitoring HIPS Windows Sophos Live Protection

More information

NTLM NTLM. Feature Description

NTLM NTLM. Feature Description Feature Description VERSION: 6.0 UPDATED: JULY 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies logo are registered

More information

User Manual. BBEdit. Professional Code and Text Editor for the Macintosh. Bare Bones Software, Inc.

User Manual. BBEdit. Professional Code and Text Editor for the Macintosh. Bare Bones Software, Inc. User Manual BBEdit Professional Code and Text Editor for the Macintosh Bare Bones Software, Inc. BBEdit 12.1.2 Product Design Product Engineering Engineers Emeritus Documentation Additional Engineering

More information

RSA Two Factor Authentication

RSA Two Factor Authentication RSA Two Factor Authentication Feature Description VERSION: 6.0 UPDATED: JULY 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies

More information

LoadMaster VMware Horizon (with View) 6. Deployment Guide

LoadMaster VMware Horizon (with View) 6. Deployment Guide LoadMaster VMware Horizon (with View) 6 Deployment Guide VERSION: 6.0 UPDATED: MARCH 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the

More information

MAGPICK - magnetic map & profile processing. User Guide.

MAGPICK - magnetic map & profile processing. User Guide. MAGPICK - magnetic map & profile processing. User Guide. Mikhail Tchernychev. 16/02/98 Beta version of the manual - last revised 12/12/2013 Contents 1 Copyrights 6 1.1 MagPick Copyright Notice...............................

More information

v13.03 Dialog Box Reference ni.com/awr

v13.03 Dialog Box Reference ni.com/awr v13.03 Dialog Box Reference ni.com/awr Dialog Box Reference NI AWR Design Environment v13.03 Edition 1960 E. Grand Avenue, Suite 430 El Segundo, CA 90245 USA Phone: +1 310.726.3000 Fax: +1 310.726.3005

More information

Notices. Third Party Project Usage. Sample Code in Documentation

Notices. Third Party Project Usage. Sample Code in Documentation Malwarebytes for Mac User Guide Version 3.7 28 February 2019 Notices Malwarebytes products and related documentation are provided under a license agreement containing restrictions on use and disclosure

More information

SDN Adaptive Load Balancing. Feature Description

SDN Adaptive Load Balancing. Feature Description SDN Adaptive Load Balancing Feature Description VERSION: 5.0 UPDATED: JULY 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies

More information

GMI-Cmd.exe Reference Manual GMI Command Utility General Management Interface Foundation

GMI-Cmd.exe Reference Manual GMI Command Utility General Management Interface Foundation GMI-Cmd.exe Reference Manual GMI Command Utility General Management Interface Foundation http://www.gmi-foundation.org Program Description The "GMI-Cmd.exe" program is a standard part of the GMI program

More information

LoadMaster Clustering

LoadMaster Clustering Introduction LoadMaster Clustering Feature Description VERSION: 9.0 UPDATED: JULY 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP

More information

Version 4.2. ch2m.com/floodmodeller

Version 4.2. ch2m.com/floodmodeller ch2m.com/floodmodeller Version 4.2 Flood Modeller Pro / Flood Modeller Free Release notes Flood Modeller v4.2 is a significant upgrade to the last release (v4.1.1). It introduces new functionality and

More information

VMware vcenter Log Insight Manager. Deployment Guide

VMware vcenter Log Insight Manager. Deployment Guide VMware vcenter Log Insight Manager Deployment Guide VERSION: 6.0 UPDATED: JULY 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies

More information

[The BSD License] Copyright (c) Jaroslaw Kowalski

[The BSD License] Copyright (c) Jaroslaw Kowalski Software used by portions of this application require the following license statement: [The BSD License] Copyright (c) 2004-2011 Jaroslaw Kowalski jaak@jkowalski.net All rights reserved. Redistribution

More information

v14 Dialog Box Reference ni.com/awr

v14 Dialog Box Reference ni.com/awr v14 Dialog Box Reference ni.com/awr Dialog Box Reference NI AWR Design Environment v14 Edition 1960 E. Grand Avenue, Suite 430 El Segundo, CA 90245 USA Phone: +1 310.726.3000 Fax: +1 310.726.3005 Website:

More information

Edge Security Pack (ESP)

Edge Security Pack (ESP) Edge Security Pack (ESP) VERSION: 1.2 UPDATED: SEPTEMBER 2013 Copyright 2002-2013 KEMP Technologies, Inc. All Rights Reserved. Page 1 / 22 Copyright Notices Copyright 2002-2013 KEMP Technologies, Inc..

More information

SpanDisc. U s e r s G u i d e

SpanDisc. U s e r s G u i d e SpanDisc U s e r s G u i d e Introduction SpanDisc User s Guide SpanDisc is a complete disc archival and backup solution. SpanDisc uses the automation features or Rimage Corporation s Digital Publishing

More information

Notices. Third Party Project Usage. Sample Code in Documentation

Notices. Third Party Project Usage. Sample Code in Documentation Malwarebytes for Mac User Guide Version 3.3.0 2 May 2018 Notices Malwarebytes products and related documentation are provided under a license agreement containing restrictions on use and disclosure and

More information

File Servant User Manual

File Servant User Manual File Servant User Manual Serve files over FTP and HTTP - at the snap of a finger! File Servant is free software (see copyright notice below). This document was last revised Monday 28 February 2011. Creator:

More information

1 What is SecExClipboard...? 2 Making your... SecExClipboard Disk 3 Using Your... SecExClipboard Disk

1 What is SecExClipboard...? 2 Making your... SecExClipboard Disk 3 Using Your... SecExClipboard Disk Contents I Table of Contents Foreword 0 Part I Introduction 2 1 What is...? 2 2 Making your... Disk 4 3 Using Your... Disk 7 4 Acknowledgements... 8 Part II About 10 1 About... 10 2 About Bytefusion...

More information

Character Tools. Version May 2005 A shareware plug-in for FrameMaker. Copyright

Character Tools. Version May 2005 A shareware plug-in for FrameMaker.   Copyright Character Tools Version 1.3 - May 2005 A shareware plug-in for FrameMaker www.siliconprairiesoftware.com Copyright 2005-2007 Portions Copyright 1986-2002 Adobe Systems Incorporated All Rights Reserved

More information

Converged Network Analyzer Command Reference Guide Addendum

Converged Network Analyzer Command Reference Guide Addendum Converged Network Analyzer Command Reference Guide Addendum for the Converged Network Analyzer (CNA), Adaptive Path Controller-Enterprise (APC-E), Adaptive Path Controller-Internet (APC-I), and the CNA

More information

KEMP Driver for Red Hat OpenStack. KEMP LBaaS Red Hat OpenStack Driver. Installation Guide

KEMP Driver for Red Hat OpenStack. KEMP LBaaS Red Hat OpenStack Driver. Installation Guide KEMP LBaaS Red Hat OpenStack Driver Installation Guide VERSION: 2.0 UPDATED: AUGUST 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP

More information

Notices. Third Party Project Usage. Sample Code in Documentation

Notices. Third Party Project Usage. Sample Code in Documentation Malwarebytes for Mac User Guide Version 3.1.1 2 November 2017 Notices Malwarebytes products and related documentation are provided under a license agreement containing restrictions on use and disclosure

More information

User Scripting April 14, 2018

User Scripting April 14, 2018 April 14, 2018 Copyright 2013, 2018, Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under a license agreement containing restrictions on use and

More information

Notices. Third Party Project Usage. Sample Code in Documentation

Notices. Third Party Project Usage. Sample Code in Documentation Malwarebytes for Mac User Guide Version 3.4.0 7 August 2018 Notices Malwarebytes products and related documentation are provided under a license agreement containing restrictions on use and disclosure

More information

DME-N Network Driver Installation Guide for M7CL

DME-N Network Driver Installation Guide for M7CL DME-N Network Driver Installation Guide for M7CL ATTENTION SOFTWARE LICENSE AGREEMENT PLEASE READ THIS SOFTWARE LICENSE AGREEMENT ( AGREEMENT ) CAREFULLY BEFORE USING THIS SOFTWARE. YOU ARE ONLY PERMITTED

More information

JPdfBookmarks Manual. by Flaviano Petrocchi

JPdfBookmarks Manual. by Flaviano Petrocchi JPdfBookmarks Manual by Flaviano Petrocchi JPdfBookmarks Manual 1 Introduction 3 Installation and Uninstallation 4 Linux Instructions 4 Debian Instructions 6 Windows Instructions 6 Universal Archive Instructions

More information

Notices. Third Party Project Usage. Sample Code in Documentation

Notices. Third Party Project Usage. Sample Code in Documentation Malwarebytes for Mac User Guide Version 3.6 5 December 2018 Notices Malwarebytes products and related documentation are provided under a license agreement containing restrictions on use and disclosure

More information

JMP to LSAF Add-in. User Guide v1.1

JMP to LSAF Add-in. User Guide v1.1 JMP to LSAF Add-in User Guide v1.1 Table of Contents Terms and Conditions... 3 System Requirements... 3 Installation... 3 Configuration... 4 API Setup... 4 Java Configuration... 5 Logging In... 5 Launching

More information

TWAIN driver User s Guide

TWAIN driver User s Guide 4037-9571-05 TWAIN driver User s Guide Contents 1 Introduction 1.1 System requirements...1-1 2 Installing the TWAIN Driver 2.1 Installation procedure...2-1 To install the software...2-1 2.2 Uninstalling...2-1

More information

Configuring Real Servers for DSR

Configuring Real Servers for DSR Configuring Real Servers for DSR VERSION: 1.1 UPDATED: JULY 2013 Copyright 2002-2013 KEMP Technologies, Inc. All Rights Reserved. Page 1 / 20 Copyright Notices Copyright 2002-2013 KEMP Technologies, Inc..

More information

Paragraph Tools. Version May 2005 A shareware plug-in for FrameMaker. Copyright

Paragraph Tools. Version May 2005 A shareware plug-in for FrameMaker.  Copyright Paragraph Tools Version 2.1 - May 2005 A shareware plug-in for FrameMaker www.siliconprairiesoftware.com Copyright 2001-2007 Portions Copyright 1986-2002 Adobe Systems Incorporated All Rights Reserved

More information

NCD ThinPATH PC Installation Guide and Release Notes

NCD ThinPATH PC Installation Guide and Release Notes NCD ThinPATH PC Installation Guide and Release s Copyright Copyright 2001 by Network Computing Devices, Inc. (NCD).The information contained in this document is subject to change without notice. Network

More information

Veritas NetBackup Add-in for Microsoft SCVMM Console Guide. Release 8.1

Veritas NetBackup Add-in for Microsoft SCVMM Console Guide. Release 8.1 Veritas NetBackup Add-in for Microsoft SCVMM Console Guide Release 8.1 Veritas NetBackup Add-in for Microsoft SCVMM Console Guide Legal Notice Copyright 2017 Veritas Technologies LLC. All rights reserved.

More information

JANUARY Conversion Software User Guide for UNIX. Version 2.0

JANUARY Conversion Software User Guide for UNIX. Version 2.0 JANUARY 2018 CDS Conversion Software User Guide for UNIX Version 2.0 USPS CDS Conversion Software Agreement This legal document is an agreement between you, the User of this software, and the United States

More information

SPListX for SharePoint Installation Guide

SPListX for SharePoint Installation Guide SPListX for SharePoint Installation Guide Product Description... 2 System Requirements and Recommendations... 3 Upgrade to the latest version of SPListX for SharePoint... 11 1 Product Description SPListX

More information

BEST PRACTICES FOR DOCKER

BEST PRACTICES FOR DOCKER BEST PRACTICES FOR DOCKER DG-08863-001 _v001 December 2018 Best Practices TABLE OF CONTENTS Chapter 1. NVIDIA Container Best Practices...1 1.1. Hello World For Containers... 1 1.2. Logging Into Docker...

More information

Bar Code Discovery. Administrator's Guide

Bar Code Discovery. Administrator's Guide Bar Code Discovery Administrator's Guide November 2012 www.lexmark.com Contents 2 Contents Overview...3 Configuring the application...4 Configuring the application...4 Configuring Bar Code Discovery...4

More information

IETF TRUST. Legal Provisions Relating to IETF Documents. Approved November 6, Effective Date: November 10, 2008

IETF TRUST. Legal Provisions Relating to IETF Documents. Approved November 6, Effective Date: November 10, 2008 IETF TRUST Legal Provisions Relating to IETF Documents Approved November 6, 2008 Effective Date: November 10, 2008 1. Background The IETF Trust was formed on December 15, 2005, for, among other things,

More information

Preface. Audience. Cisco IOS Software Documentation. Organization

Preface. Audience. Cisco IOS Software Documentation. Organization This preface describes the audience, organization, and conventions of this publication, and provides information on how to obtain related documentation. Cisco documentation and additional literature are

More information

Restaurant Enterprise Solution (RES) Version 5, Generation 2 Prerequisite Patch Documentation

Restaurant Enterprise Solution (RES) Version 5, Generation 2 Prerequisite Patch Documentation Restaurant Enterprise Solution (RES) Version 5, Generation 2 Prerequisite Patch Documentation General Information About This Document This documentation describes the RES Prerequisites Patch. This document

More information

TOOLS for n Version2 Update Guide

TOOLS for n Version2 Update Guide TOOLS for n Version2 Update Guide SOFTWARE LICENSE AGREEMENT PLEASE READ THIS SOFTWARE LICENSE AGREEMENT ( AGREEMENT ) CAREFULLY BEFORE USING THIS SOFTWARE. YOU ARE ONLY PERMITTED TO USE THIS SOFTWARE

More information

Version December 2011 A shareware plug-in for FrameMaker. Copyright 2011

Version December 2011 A shareware plug-in for FrameMaker.   Copyright 2011 Color Tools Version 1.0 - December 2011 A shareware plug-in for FrameMaker www.siliconprairiesoftware.com Copyright 2011 Portions Copyright 1986-2002 Adobe Systems Incorporated All Rights Reserved Copyright

More information

Enterprise Vault.cloud CloudLink Google Account Synchronization Guide. CloudLink to 4.0.3

Enterprise Vault.cloud CloudLink Google Account Synchronization Guide. CloudLink to 4.0.3 Enterprise Vault.cloud CloudLink Google Account Synchronization Guide CloudLink 4.0.1 to 4.0.3 Enterprise Vault.cloud: CloudLink Google Account Synchronization Guide Last updated: 2018-06-08. Legal Notice

More information

Komodo CAN Interface. Komodo TM CAN Interface GUI. Komodo GUI User s Manual v1.50 Octorber 26, 2012

Komodo CAN Interface. Komodo TM CAN Interface GUI. Komodo GUI User s Manual v1.50 Octorber 26, 2012 Komodo CAN Interface Komodo GUI User s Manual v1.50 Octorber 26, 2012 Summary The Komodo GUI is a graphical application for use with the Komodo CAN Interface. The application provides access to CAN Bus

More information

PingStation User and Installation Guide

PingStation User and Installation Guide PingStation User and Installation Guide REVISION D UAV-1001358-001 Page 1 25 UAV-1001358-001 Page 2 25 2017 uavionix Corporation. All rights reserved. uavionix Corporation 380 Portage Ave. Palo Alto, CA

More information

Variable Tools. Version December 2011 A shareware plug-in for FrameMaker. Copyright 2011

Variable Tools. Version December 2011 A shareware plug-in for FrameMaker.  Copyright 2011 Variable Tools Version 1.0 - December 2011 A shareware plug-in for FrameMaker www.siliconprairiesoftware.com Copyright 2011 Portions Copyright 1986-2002 Adobe Systems Incorporated All Rights Reserved Copyright

More information

LoadMaster Clustering (Beta)

LoadMaster Clustering (Beta) Introduction LoadMaster Clustering (Beta) Feature Description VERSION: 5.0 UPDATED: OCTOBER 2015 Copyright Notices Copyright 2002-2015 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and

More information

IETF TRUST. Legal Provisions Relating to IETF Documents. February 12, Effective Date: February 15, 2009

IETF TRUST. Legal Provisions Relating to IETF Documents. February 12, Effective Date: February 15, 2009 IETF TRUST Legal Provisions Relating to IETF Documents February 12, 2009 Effective Date: February 15, 2009 1. Background The IETF Trust was formed on December 15, 2005, for, among other things, the purpose

More information

Scott Auge

Scott Auge Scott Auge sauge@amduus.com Amduus Information Works, Inc. http://www.amduus.com Page 1 of 14 LICENSE This is your typical BSD license. Basically it says do what you want with it - just don't sue me. Written

More information

UNIX and Linux Essentials Student Guide

UNIX and Linux Essentials Student Guide UNIX and Linux Essentials Student Guide D76989GC10 Edition 1.0 June 2012 D77816 Authors Uma Sannasi Pardeep Sharma Technical Contributor and Reviewer Harald van Breederode Editors Anwesha Ray Raj Kumar

More information

TERMS AND CONDITIONS

TERMS AND CONDITIONS TERMS AND CONDITIONS BACKGROUND: This agreement applies as between you, the User of this Website and NWM, the owner(s) of this Website. Your agreement to comply with and be bound by these terms and conditions

More information

Veritas NetBackup for Lotus Notes Administrator's Guide

Veritas NetBackup for Lotus Notes Administrator's Guide Veritas NetBackup for Lotus Notes Administrator's Guide for UNIX, Windows, and Linux Release 8.0 Veritas NetBackup for Lotus Notes Administrator's Guide Document version: 8.0 Legal Notice Copyright 2016

More information

MS Lync MS Lync Deployment Guide

MS Lync MS Lync Deployment Guide MS Lync 2013 Deployment Guide VERSION: 7.0 UPDATED: JULY 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies logo are registered

More information

Scribe Insight Installation Guide. Version August 10, 2011

Scribe Insight Installation Guide. Version August 10, 2011 Scribe Insight Installation Guide Version 7.0.2 August 10, 2011 www.scribesoft.com Important Notice No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form

More information

CA File Master Plus. Release Notes. Version

CA File Master Plus. Release Notes. Version CA File Master Plus Release Notes Version 9.0.00 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is for

More information

SysInfoTools PST Compress and Compact v5.0

SysInfoTools PST Compress and Compact v5.0 SysInfoTools PST Compress and Compact v5.0 Table Of Contents 1. SysInfoTools PST Compress and Compact v5.0... 2 2. Overview... 2 3. Getting Started... 3 3.1 Installation Procedure... 3 4. Order and Activation...

More information

Web Application Firewall (WAF) Feature Description

Web Application Firewall (WAF) Feature Description Web Application Firewall (WAF) Feature Description VERSION: 7.0 UPDATED: JULY 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies

More information

Perfect Time Pro v User Manual

Perfect Time Pro v User Manual Perfect Time Pro v 2.0 - User Manual With Perfect Time Pro Version 2.0, we have combined two of our very successful product lines into one comprehensive time management solution. Merging our Point Of Entry

More information

SonicWall Global VPN Client Getting Started Guide

SonicWall Global VPN Client Getting Started Guide SonicWall Global VPN Client 4.10 Getting Started Guide Copyright 2017 SonicWall Inc. All rights reserved. SonicWall is a trademark or registered trademark of SonicWall Inc. and/or its affiliates in the

More information

ALLIEDVIEW-UM 1.6 USER'S GUIDE

ALLIEDVIEW-UM 1.6 USER'S GUIDE ALLIEDVIEW-UM 1.6 USER'S GUIDE PN 613-000381 Rev B Page 1 of 129 Copyright 2002-2007 Allied Telesis K. K. All rights reserved. No part of this publication may be reproduced without prior written permission

More information

NET SatisFAXtion TM Configuration Guide For use with AT&T s IP Flexible Reach Service And IP Toll Free Service

NET SatisFAXtion TM Configuration Guide For use with AT&T s IP Flexible Reach Service And IP Toll Free Service NET SatisFAXtion TM Configuration Guide For use with AT&T s IP Flexible Reach Service And IP Toll Free Service Version 0.9b 2008-02-01 Page 1 of 20 TABLE OF CONTENTS 1 Introduction... 3 2 Special Notes...

More information

MagicInfo Express Content Creator

MagicInfo Express Content Creator MagicInfo Express Content Creator MagicInfo Express Content Creator User Guide MagicInfo Express Content Creator is a program that allows you to conveniently create LFD content using a variety of templates.

More information

SAP Jam Communities What's New 1808 THE BEST RUN. PUBLIC Document Version: August

SAP Jam Communities What's New 1808 THE BEST RUN. PUBLIC Document Version: August PUBLIC Document Version: August 2018 2018-10-26 2018 SAP SE or an SAP affiliate company. All rights reserved. THE BEST RUN Content 1 Release Highlights....3 1.1 Anonymous access to public communities....4

More information

The customer.inf setup is only available for the Barracuda VPN Client. It requires administrator rights on the target system.

The customer.inf setup is only available for the Barracuda VPN Client. It requires administrator rights on the target system. In this Article: Preparing a The customer.inf setup is only available for the Barracuda VPN Client. It requires administrator rights on the target system. Customer.inf setup is a comprehensive installation

More information

Getting Started (No installation necessary) Windows On Windows systems, simply double click the AntGram icon to launch the program.

Getting Started (No installation necessary) Windows On Windows systems, simply double click the AntGram icon to launch the program. AntGram (Windows) Build 1.0 (Released September 22, 2018) Laurence Anthony, Ph.D. Center for English Language Education in Science and Engineering, School of Science and Engineering, Waseda University,

More information

Client Portal Client User Manual

Client Portal Client User Manual Client Portal Client User Manual Version 2.0 Contents Client Portal User Manual... 3 Groups and User Levels... 3 Inviting Users... 5 Terms of Use... 9 Removing Users... 12 Password Reset... 14 List Items

More information

CST8207: GNU/Linux Operating Systems I Lab Ten Boot Process and GRUB. Boot Process and GRUB

CST8207: GNU/Linux Operating Systems I Lab Ten Boot Process and GRUB. Boot Process and GRUB Student Name: Lab Section: Boot Process and GRUB 1 Due Date - Upload to Blackboard by 8:30am Monday April 16, 2012 Submit the completed lab to Blackboard following the Rules for submitting Online Labs

More information

MyCreditChain Terms of Use

MyCreditChain Terms of Use MyCreditChain Terms of Use Date: February 1, 2018 Overview The following are the terms of an agreement between you and MYCREDITCHAIN. By accessing, or using this Web site, you acknowledge that you have

More information

ServerStatus Installation and Operation Manual

ServerStatus Installation and Operation Manual ServerStatus Installation and Operation Manual Capitalware Inc. Unit 11, 1673 Richmond Street, PMB524 London, Ontario N6G2N3 Canada sales@capitalware.com http://www.capitalware.com ServerStatus Installation

More information

VISUDO(8) System Manager s Manual VISUDO(8)

VISUDO(8) System Manager s Manual VISUDO(8) NAME visudo - edit the sudoers file SYNOPSIS visudo [-chqsv] [-f sudoers] [-x output_file] DESCRIPTION visudo edits the sudoers file in a safe fashion, analogous to vipw(8). visudo locks the sudoers file

More information

OneBridge Mobile Groupware 5.0

OneBridge Mobile Groupware 5.0 OneBridge Mobile Groupware 5.0 release overview Extended Systems 5777 North Meeker Avenue Boise, ID 83713 Tel: (800) 235-7576 (208) 322-7800 Fax: (208) 327-5004 Web: www.extendedsystems.com Rev. 1005 Legal

More information

One Identity Manager Administration Guide for Connecting to SharePoint

One Identity Manager Administration Guide for Connecting to SharePoint One Identity Manager 8.0.2 Administration Guide for Connecting to Copyright 2018 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software

More information